City: unknown
Region: unknown
Country: United States
Internet Service Provider: SecuredConnectivity.net
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attackbotsspam | NAME : SECUREDCONNECTIVITY-69-16-147-0-24 CIDR : 69.16.147.0/24 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Arizona - block certain countries :) IP: 69.16.147.77 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-06-25 09:10:37 |
IP | Type | Details | Datetime |
---|---|---|---|
69.16.147.54 | attack | (From samchristopher@businesspromoted.club) bissland.com is currently receiving 8.42k clicks from organic traffic. However, your competition is crushing it You can view detailed traffic analysis at https://www.spyfu.com/overview/domain?query=bissland.com 8.42k clicks are certainly not enough. We can certainly do better! We need to do better. It is not that difficult. With in-depth keyword research and on-page optimization it is doable. We will reverse engineer competitor's link building strategies and get the links from similar sources. Our method works and thats why we are happy to offer money back guarantee. Yes, for whatever reason if your site is not ranking on Google then we will refund your 100% payment. No questions asked. If you like my proposal then please let me know a good time and phone number to reach out to you and we will present detailed plan of action. Looking forward to working with you. Sam Devi Business Development Manager Business Promoted |
2019-07-11 15:50:33 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.16.147.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25798
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;69.16.147.77. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019062401 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 25 09:10:31 CST 2019
;; MSG SIZE rcvd: 116
77.147.16.69.in-addr.arpa domain name pointer 69-16-147-77.ipvanish.com.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
77.147.16.69.in-addr.arpa name = 69-16-147-77.ipvanish.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
72.14.82.24 | attackbots | unauthorized connection attempt |
2020-01-17 20:23:47 |
150.129.121.33 | attackbotsspam | unauthorized connection attempt |
2020-01-17 20:32:46 |
220.133.12.165 | attack | Unauthorized connection attempt detected from IP address 220.133.12.165 to port 4567 [J] |
2020-01-17 20:41:28 |
173.56.119.71 | attackspambots | unauthorized connection attempt |
2020-01-17 20:32:11 |
177.0.244.162 | attackbots | unauthorized connection attempt |
2020-01-17 20:48:06 |
190.232.185.111 | attack | Unauthorized connection attempt detected from IP address 190.232.185.111 to port 23 [J] |
2020-01-17 20:28:57 |
191.249.223.55 | attackspambots | unauthorized connection attempt |
2020-01-17 20:46:39 |
78.85.244.214 | attackspambots | unauthorized connection attempt |
2020-01-17 20:37:50 |
80.68.96.209 | attack | Unauthorized connection attempt detected from IP address 80.68.96.209 to port 5555 [J] |
2020-01-17 20:44:21 |
149.90.149.99 | attack | unauthorized connection attempt |
2020-01-17 20:16:29 |
182.74.124.158 | attackspambots | unauthorized connection attempt |
2020-01-17 20:30:20 |
5.140.232.19 | attack | Unauthorized connection attempt detected from IP address 5.140.232.19 to port 83 [J] |
2020-01-17 20:26:46 |
213.189.215.18 | attackspambots | unauthorized connection attempt |
2020-01-17 20:41:51 |
113.116.178.199 | attackspambots | unauthorized connection attempt |
2020-01-17 20:19:56 |
222.186.42.7 | attack | Trying ports that it shouldn't be. |
2020-01-17 20:45:37 |